Deep Dive How To Debug Syslog Ingestion for Sentinel and Log Analytics

 
Hello everybody, Simone here to tell you about a situation that happened many times to my customers: understanding how the syslog ingestion works.
To make subject clear make sure you have clear in mind the below references:

RFC5424 – https://to… Continue reading Deep Dive How To Debug Syslog Ingestion for Sentinel and Log Analytics

Oh the depths we will go at the ITOps Talks: All Things Hybrid event

Targets are locked. We’re flooding the torpedo tubes so we’re ready to dive into battle for this Feb 2nd event. I believe it’s time to share some freshly declassified details about things we have planned, so let’s kick this off with the event flow and … Continue reading Oh the depths we will go at the ITOps Talks: All Things Hybrid event

How companies are securing devices with Zero Trust practices

Organizations are seeing a substantial increase in the diversity of devices accessing their networks. With employees using personal devices and accessing corporate resources from new locations in record numbers, IT leaders are seeing an increase in the… Continue reading How companies are securing devices with Zero Trust practices

Secure Application Lifecycle – Part 3 – Azure Sentinel

In the past part 1 and part 2, I discussed how we can monitor the security and health of our subscription manually. Also, we used Microsoft tools to find security issues with the subscription and discussed how we could resolve them.
Today I would like … Continue reading Secure Application Lifecycle – Part 3 – Azure Sentinel

Upcoming CollabCast with Adobe: Health and Life Sciences In the Age of Digitization

 
COVID is driving a tsunami of digital transformation initiatives in Healthcare and Life Science. But what’s the role and impact of electronic signatures within that industry vertical? During this webinar, Jayashree Ramakrishna (Adobe Head of In… Continue reading Upcoming CollabCast with Adobe: Health and Life Sciences In the Age of Digitization

Secure Application Lifecycle – Part 2- Secure DevOps Kit for Azure (AzSK)

In my previous blog I addressed the issue of managing credentials in the code and presented two different alternatives to secure it. In this post, I will focus on Azure subscription security health and its challenge. I could summarize the subscrip… Continue reading Secure Application Lifecycle – Part 2- Secure DevOps Kit for Azure (AzSK)